Sale Timeline: ExpressVPN's Holiday Discounts cover Christmas and New Year promotions running December 19, 2025 to January 7, 2026 site-wide Maximum Discount Offered: Users can…
Key Takeaways Widespread obsolescence: Many new smart devices ship with web browsers that are sometimes over three years out of date. Tangible security flaws: These…
Key Takeaways Robust detection: Amazon has prevented over 1,800 suspected North Korean (DPRK) operatives from joining the company since April 2024. AI-powered screening: Amazon leverages…
Key Takeaways Breach confirmation: DXS International, a technology provider for NHS England, confirmed a security incident affecting its office servers, discovered on December 14. Ransomware…
Key Takeaways Significant indictment: Over 50 individuals, some associated with Tren de Aragua, face charges linked to an alleged ATM jackpotting operation in the U.S.…
Linux GUI Support Added: Surfshark Dedicated IP on Linux is now accessible directly through the Linux GUI app. Dedicated IP Benefits Explained: Dedicated IP offers…
Key Takeaways France arrest: French authorities have arrested a 22-year-old suspect in connection with a December cyberattack on France's Ministry of the Interior. Prior convictions:…
Key Takeaways Scale of exposure: Over 96,000 user records from the now-defunct vBulletin forum were exposed. Breach timeline: The data breach occurred in August 2012…
Key Takeaways Sonora operations halted: The Secretaría de Hacienda of Sonora suspended payment operations following a suspected cyberattack targeting its Financial Information System. Political data…
Key Takeaways Critical vulnerability: A Chinese-linked threat actor is actively exploiting an unpatched flaw in Cisco AsyncOS that enables root-level command execution. Targeted products: The…
Unified Qt foundation: ExpressVPN shifts desktop apps to Qt, enabling shared development, consistent features, and aligned updates across Linux-first rollout: Linux launches first with redesigned…
Key Takeaways Compliance as a differentiator: Achieving regulatory compliance is a key indicator of an organization's speed in responding to software supply chain flaws. AI…
Key Takeaways Coordinated operation: A massive phishing campaign has been identified involving the registration of 244 fake online domains this year to impersonate legitimate retailers.…
Key Takeaways Targeted services: An ongoing cryptomining campaign is targeting Amazon Elastic Compute Cloud (EC2) and Amazon Elastic Container Service (ECS). IAM credentials: The campaign…
Key Takeaways Ransomware confirmed: Yokosuka Gakuin School Corporation confirmed it sustained a ransomware attack in early December 2025 that led to a data breach. Unauthorized…
Key Takeaways New targets: The China-linked espionage group "Ink Dragon" targets government and telecommunications entities across Europe, Asia, and Africa. Stealth tactics: The group gains…
MPs raise VPN concerns: Lawmakers fear children use VPNs to bypass age checks under Online Safety Act. Responsibility on VPN firms: MPs suggest VPN providers…
Hidden AI Data Collection: Injected scripts capture AI prompts and replies across platforms, even when VPN remains disabled. Trust Signals and Exposure: Google “Featured” badge…
Key Takeaways Remote code execution: A critical buffer overflow vulnerability (CVE-2024-39432) in Unisoc modems allows RCE at the data link layer (RLC protocol). Protocol stack…
Key Takeaways Cross-border action: Authorities dismantled a coordinated, multinational cyber fraud operation Scam operations: The call centers used impersonation and remote access to steal funds…
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: